The National Academy of Sciences has been working for 155 years to advance our nation’s understanding of key technology issues. One of the ways they help advance knowledge is bringing together thought leaders and highly qualified experts, academics and practitioners to work on issues and then publish results for all
The Executive’s Guide To Quantum Safe Security: Take these steps to make your enterprise quantum proof
The steady progress in quantum computing is resulting in exciting developments that will one day bring new capabilities to a wide range of use cases. Quantum computers can also bring new capabilities to attackers. The mathematician Peter Shor has proven that quantum computers can be used to rapidly factor large numbers into their primes in a way that will break most forms of asymmetric encryption used today. The computer scientist Lov Grover proved another algorithm that will, among other things, enable incredibly fast invalidation of another tool for security, the security hash. There are certainly other ways quantum computers will be used by adversaries, but these two methods alone are cause for serious concern. Imagine all the data your company believes is important being read by an adversary that wants to put you out of business, and imagine that adversary is operating in a location untouchable by the rule of law.
AI World is a yearly gathering of professionals applying advanced AI solutions to solve enterprise challenges. They gather to exchange lessons learned and best practices as well as to track the latest technology which can aid them in their quest to improve the application of thinking machines to real world
Quantum Supremacy Is Here: The History Making Quantum Computing News We Have Been Anticipating Has Now Been Reported
Months ago we began to formulate an assessment that a history-making announcement in quantum computing was about to be made. For years the big players in quantum research, including IBM, Microsoft and Google, have been pursuing different methods of using quantum effects to do new calculations. Google had even made announcements indicating they thought they could achieve history-making results in the near term. Because of all that we had been producing a series of reports aimed at making you as informed as possible on what breakthrough announcements in quantum computing could mean for your business strategy.
This special report provides an overview of the dynamic trends underway in the cyber insurance market, including actionable information that executives can put to use right now in determining the right approach to using cyber insurance to transfer risk. The report also provides insights which can be of use to any tech firm seeking to partner with insurance companies to enhance services to the market.
This guide captures key concepts and the status of major quantum computing research initiatives in a way meant to serve the needs of operational decision-makers. Our goal, inform you about the near future so you can make the right changes to your strategy today. After a review of some key quantum computing concepts we will provide an update on some of the most promising research initiatives and key use cases being explored. We then conclude with insights you can use for your strategic approach and a list of resources for further research.
This is the second of a series on our nation’s most neglected critical infrastructure, our cognitive infrastructure. The first post dove into the nature of the challenge and why it is so important for our future that the threats to our cognitive infrastructure are understood and addressed. This post flows from that one and suggests ways the nation can mitigate many of these risks.
This special report is the first of a two-part series designed to both inform OODA members on the nature of challenges to our nation’s most critical infrastructure and provide recommendations for action that can mitigate these challenges. Our thesis is that America’s most critical infrastructure is our cognitive infrastructure. This is also the most attacked and least defended. In short, our most important critical infrastructure is also our most neglected infrastructure.
The DoDIIS Conference: Insights into how IT supports some of the most critical missions in the nation
With this post we provide some insights for OODA members from the 2-5 August 2019 DoDIIS conference. We have aimed this overview for three broad types of decision-makers: 1) The startup tech executive seeking to better serve government missions, 2) Business leaders seeking insights into global risks and mitigation efforts relevant to your organization, and 3) The government leader seeking independent views that could impact your approach to enterprise technology.
There is something you really need to know about the State of California. They have optimized around a key function that they do very very well. They know how to collect money from corporations. They know how to collect taxes, and know how to levy large fines and collect on them. The business that owes California money will pay, and the State will likely do everything in their power to make sure they pay as much as the law allows. Keep this in mind as you read our guidance on the CCPA.